首页> 外文期刊>MATEC Web of Conferences >Inside the Closed World: User and Device Profile Analytics for SCADA Security
【24h】

Inside the Closed World: User and Device Profile Analytics for SCADA Security

机译:在封闭的世界中:用于SCADA安全的用户和设备配置文件分析

获取原文
           

摘要

Attacks that use sophisticated and complex methods in-creased recently, aiming to infiltrate the Supervisory Control and Data Acquisition (SCADA) system and stay undetected. Therefore, attackers often get access to authorized permissions of SCADA and bring catastrophic damages by sending ‘legitimate’ control commands. Furthermore, insiders may also misuse or abuse their permissions to damage SCADA system, which is difficult to predict and protect against them. Most existing security systems employ standard signature-based or anomaly-based approaches, which are not able to identify this type of malicious activities. In this paper, we use machine learning algorithms based on Singular Values Decomposition (SVD) to create profiles of users and devices. The major contribution of this paper is providing a general process to detect anomalies, independent of specific use-cases. Suspicious actions are altered to analysts with relevant contextual information for further investigation and action. We provide detailed description of algorithms, methodology, processing of profiling and anomaly detection. Having profiles of different users and devices can provide us a baseline of normal behavior to compare against unusual behaviors. To demonstrate the proposed method, attack scenarios have been simulated at a Compressed Natural Gas (CNG) system in our lab. Experimental results illustrate that the proposed method is effective for abnormal behaviors in SCADA system.
机译:最近,使用复杂的复杂方法的攻击有所增加,旨在渗透到监控和数据采集(SCADA)系统中,并且未被发现。因此,攻击者通常可以访问SCADA的授权权限,并通过发送“合法”控制命令带来灾难性的损失。此外,内部人员还可能滥用或滥用其权限来破坏SCADA系统,这很难预测和防范。现有的大多数安全系统都采用基于标准签名或基于异常的方法,这些方法无法识别这种类型的恶意活动。在本文中,我们使用基于奇异值分解(SVD)的机器学习算法来创建用户和设备的配置文件。本文的主要贡献是提供了一种检测异常的通用过程,而与特定用例无关。具有相关上下文信息的分析人员将可疑操作更改为进一步调查和采取措施。我们提供算法,方法论,分析和异常检测处理的详细说明。具有不同用户和设备的配置文件可以为我们提供正常行为的基准,以与异常行为进行比较。为了演示该方法,我们在实验室的压缩天然气(CNG)系统中模拟了攻击场景。实验结果表明,该方法对于SCADA系统中的异常行为是有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号